Encoding and Decoding information with the help of Hill Cipher

Abstract

The role of cryptographic part in today‟s world is very significant. It not only secures information mathematically by mailing massage with a key but also provides confidentiality which is the most important factor in today‟s world. Hill cipher is also one of the most famous symmetric cryptosystem which can be used to protect information from unauthorized party. This paper gives us dimensions of new technique in Hill cipher, here we are developing the complex procedure of key generation for the process of encryption of message to avoid any kind of data loss. Hill cipher is a matrix based poly graphic substitution which is an additional factor to the user. A sender wants to transmit information to a receiver over an insecure channel that is a channel which may be tapped by any one. So, the information which is to be transferred, which we call the plaintext (actual message) which must be transformed (encrypt) to a cipher text, a form not legible by anybody other than the particular receiver. There must be given some way to decrypt the cipher text, i.e. get back the original message, while this must not be possible for receiver to read the information. This is where keys come into play; the receiver is considered to have a key at his disposal, let him to recover the actual message, a fact that distinguishes him from any data loss. This leads to the user for a secure account for user.

Authors and Affiliations

Ashish Vashisht

Keywords

Related Articles

Congestion Control In Wireless Peer Networks

A Mobile Ad hoc Network (MANET) is a continuous self configuring infrastructure less network of mobile devices connected without wires. In this network several nodes exchange packets simultaneously to the destination nod...

Argemone Mexicana: A rarefied Splendour prickly foliage weed of sustainable bio additive for commercial diesel engines

Using of crop-based foliage (edible oils) to produce sustainable energy increases the volume of lowcarbon fuels, but detriments hunger in developing countries by pushing up global food prices and endangering local food s...

Impact of Service Quality on Satisfaction of Spectator

The aim of this study is to investigate the effect of service quality on spectator satisfaction . To measure service quality, Groonroos (1984) theoretical framework which contained two dimensions of technical quality(out...

Study on Strongly Pseudo Irregular Fuzzy Graphs

In this paper, Some results on Strongly pseudo Irregular Fuzzy Graphs and Strongly pseudo total Irregular Fuzzy Graphs are established. Comparative study between Strongly pseudo Irregular Fuzzy Graphs and Strongly pseudo...

Does Ethnic Federalism Exacerbating or Reducing Conflicts? The Ethiopian Federal Experiences

The language based federal arrangement is a new frontier under the Ethiopia political scenario. Unlike the previous regime which overlooked various ethnic groups of the nation, the current political system recognized the...

Download PDF file
  • EP ID EP245996
  • DOI -
  • Views 131
  • Downloads 0

How To Cite

Ashish Vashisht (2017). Encoding and Decoding information with the help of Hill Cipher. International journal of Emerging Trends in Science and Technology, 4(8), 5692-5696. https://europub.co.uk./articles/-A-245996